Cargando…

Computer security techniques for nuclear facilities : technical guidance.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Atomic Energy Agency
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Vienna : International Atomic Energy Agency, 2021.
Colección:IAEA nuclear security series ; no. 17-T (Rev. 1)
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1317842415
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220518s2021 au a ob 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d N$T  |d OCLCF  |d OCLCQ  |d OCLCO 
020 |a 9789201237200  |q (electronic bk.) 
020 |a 9201237200  |q (electronic bk.) 
035 |a (OCoLC)1317842415 
050 4 |a TK9153 
082 0 4 |a 621.48/35  |2 23/eng/20220531 
049 |a UAMI 
245 0 0 |a Computer security techniques for nuclear facilities :  |b technical guidance. 
264 1 |a Vienna :  |b International Atomic Energy Agency,  |c 2021. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IAEA nuclear security series ;  |v no. 17-T (Rev. 1) 
504 |a Includes bibliographical references. 
588 |a Online resource; title from PDF title page (EBSCO, viewed May 31, 2022). 
505 0 |a Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. Basic Concepts and Relationships -- Nuclear security and computer security -- Facility functions, computer security levels and computer security zones -- Computer security risk management -- Competing demands of simplicity, efficiency and computer security -- Conceptual nuclear facility zone model -- Computer security measures -- Computer based systems and digital assets (including SDAs) -- Cyber-attack -- Interface with safety -- 3. General Considerations for Computer Security 
505 8 |a Identification of facility functions -- Protection of sensitive information and digital assets -- Risk informed approach -- Risk assessment and management -- Computer security levels based on a graded approach -- 4. Facility Computer Security Risk Management -- Objective of facility computer security risk management -- Outline of facility computer security risk management -- Inputs to facility computer security risk management -- Phases of facility computer security risk management -- Scope definition -- Facility characterization -- Identification of facility functions 
505 8 |a Intrinsic significance of facility functions -- Potential effects of compromise of a system on facility function -- Interdependencies between facility functions -- Necessary timeliness and accuracy for facility function interdependencies -- Target identification -- Documentation of facility functions -- Threat characterization -- Sources of threat information -- Facility specific threat characterization -- Additional considerations for insider threats -- Specification of computer security requirements -- Computer security policy and computer security programme 
505 8 |a Assignment of systems performing facility functions to computer security levels -- Defensive computer security architecture specification -- Requirements in the DCSA specification to apply a graded approach -- Requirements in the DCSA specification to apply defence in depth -- Trust model -- Relationship with system computer security risk management -- performed for each system -- Assurance activities -- Evaluation -- Verification -- Validation -- Scenario identification and development -- Facility computer security risk management output -- 5. System Computer Security Risk Management 
505 8 |a General considerations -- Overview -- System computer security risk management process -- Overall defensive computer security architecture requirements for computer security -- Definition of system boundaries -- Definition and construction of computer security zones -- Identification of digital assets -- System computer security architecture, including digital asset analysis -- Verification of the system computer security risk assessment -- System computer security risk management report 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Nuclear facilities  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Installations nucléaires  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Nuclear facilities  |x Security measures  |2 fast 
710 2 |a International Atomic Energy Agency. 
830 0 |a IAEA nuclear security series ;  |v no. 17-T (Rev. 1) 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3282319  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6985992 
938 |a EBSCOhost  |b EBSC  |n 3282319 
994 |a 92  |b IZTAP